O'Reilly logo
  • Michael Weiss thinks this is interesting:

First the adversary takes some action, to steal, destroy, or tease. This causes the defender community to circle-up develop protections, build firewalls, and perimeter sensors, develop access controls and policies for behavior. This in turn encourages the adversaries to develop new technologies and new means of achieving their objectives.

From

Cover of Research Methods for Cyber Security

Note

Arms race